
Summary
This detection rule focuses on identifying potentially malicious child processes spawned by the Windows executable "regsvr32.exe". Regsvr32 is commonly used to register and unregister DLLs, which can be exploited by attackers to run arbitrary code. The rule looks specifically for child processes of regsvr32, including known potentially harmful applications like calc.exe, powershell.exe, and others, indicating a possible defense evasion attempt. The rule is structured with a primary condition that checks if the parent process is regsvr32 and if the child process matches a specified list of executables. A filter exists to account for specific command-line arguments related to werfault.exe to prevent false positives. Overall, this rule plays a critical role in monitoring potentially malicious activities in Windows environments and can be a part of a broader security strategy.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2022-05-05